Analysis

  • max time kernel
    114s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 02:41

General

  • Target

    dcc1bc682b2986f3fba231a8c370b5e59dcc2173e146e1f160ac89631b5ec094.exe

  • Size

    689KB

  • MD5

    37c146a1dac773ac2e17dd982ab5b66f

  • SHA1

    fbee4337e2446c21f7d320e8c02964ab9316c335

  • SHA256

    dcc1bc682b2986f3fba231a8c370b5e59dcc2173e146e1f160ac89631b5ec094

  • SHA512

    6140831c77fe0c88ed48d16a7a98537492fc7c87bde8a4004a8ff454ceaa00c973816e43040d047363224fafed493f5bcb3cbbdad7f6bf98e60b02567d5a24ad

  • SSDEEP

    12288:/Mrey90eGG8XEe8CMUIt3gp0+ye65hLuCq1F7LjpgDRJ6R6v4F5WfigkJ9nA4:dyhGGWEe2HiK7FfaRfyDJA5Wage9A4

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dcc1bc682b2986f3fba231a8c370b5e59dcc2173e146e1f160ac89631b5ec094.exe
    "C:\Users\Admin\AppData\Local\Temp\dcc1bc682b2986f3fba231a8c370b5e59dcc2173e146e1f160ac89631b5ec094.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2584
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un120869.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un120869.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3240
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6990.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6990.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4176
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 1084
          4⤵
          • Program crash
          PID:4168
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2687.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2687.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1808
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 1352
          4⤵
          • Program crash
          PID:4516
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si386325.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si386325.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4512
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4176 -ip 4176
    1⤵
      PID:1780
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1808 -ip 1808
      1⤵
        PID:1624

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si386325.exe

        Filesize

        175KB

        MD5

        78c6f719effb45ecd7051fa4608b9450

        SHA1

        79de126a901e7417587ed4207babde31683eefa3

        SHA256

        0de780ea486456ce79b8340439dcca441ef695b268c51831645b638245aa30d9

        SHA512

        d227486c9b2e94ed2b9a8461dbc0cc6ea2743f42e76d498954a8c135a0d674011735705f2c5ee5a9a6e410d9602bd60481ab5623834b1d09880e5c854a171bdc

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si386325.exe

        Filesize

        175KB

        MD5

        78c6f719effb45ecd7051fa4608b9450

        SHA1

        79de126a901e7417587ed4207babde31683eefa3

        SHA256

        0de780ea486456ce79b8340439dcca441ef695b268c51831645b638245aa30d9

        SHA512

        d227486c9b2e94ed2b9a8461dbc0cc6ea2743f42e76d498954a8c135a0d674011735705f2c5ee5a9a6e410d9602bd60481ab5623834b1d09880e5c854a171bdc

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un120869.exe

        Filesize

        548KB

        MD5

        74c5b0729277dcaadc9d9149405ed6da

        SHA1

        2795c1e21cac481bdb4793ed8cfc8909a4641ed9

        SHA256

        e3047a572f89116809ce9f9af4c1b4fc3861dcddf349962b250447b18c855407

        SHA512

        6008e1478874f92294cd3c0330ef75adeb8a1397b825ec58f15e9de9e9f9001e3c6d983b9068d1fa9cdaed85750c32b16a65717ddc64641057fa1bb0ad6b3247

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un120869.exe

        Filesize

        548KB

        MD5

        74c5b0729277dcaadc9d9149405ed6da

        SHA1

        2795c1e21cac481bdb4793ed8cfc8909a4641ed9

        SHA256

        e3047a572f89116809ce9f9af4c1b4fc3861dcddf349962b250447b18c855407

        SHA512

        6008e1478874f92294cd3c0330ef75adeb8a1397b825ec58f15e9de9e9f9001e3c6d983b9068d1fa9cdaed85750c32b16a65717ddc64641057fa1bb0ad6b3247

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6990.exe

        Filesize

        291KB

        MD5

        ab10ccdbac883fa9b4cf5fa96b01f93e

        SHA1

        954e1046398b2cad446f59cac7539508c8dec4f2

        SHA256

        8f6b75077a246075e68cd6cde4347f3a6088c0e40fd1461ef6cf11c5ce02449a

        SHA512

        e2aa3cb50f565a488a1c2476b08ab9e841435805b1b06d40091ca04074998291c9b06ab3843571e3c7ea00ca907d3aa45b376c96f00f415c36a3047b6654181f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6990.exe

        Filesize

        291KB

        MD5

        ab10ccdbac883fa9b4cf5fa96b01f93e

        SHA1

        954e1046398b2cad446f59cac7539508c8dec4f2

        SHA256

        8f6b75077a246075e68cd6cde4347f3a6088c0e40fd1461ef6cf11c5ce02449a

        SHA512

        e2aa3cb50f565a488a1c2476b08ab9e841435805b1b06d40091ca04074998291c9b06ab3843571e3c7ea00ca907d3aa45b376c96f00f415c36a3047b6654181f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2687.exe

        Filesize

        345KB

        MD5

        7e439cc76facf80477c17aa7a2efa616

        SHA1

        5e50446061142e6fbe3ae3172aa5d96ecc568d19

        SHA256

        187199e06a0f50a01e23745c7002573c4f4fb6dacaec717317239865a1196ae9

        SHA512

        5d14fe4da5b480ca8b537ef7a36cc427419d1246b86e1e929011ecec5e4fccd6bd29fd7401a3f4f365edaf28b4f570639553e3b7a318187e0fe816710c9fb482

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2687.exe

        Filesize

        345KB

        MD5

        7e439cc76facf80477c17aa7a2efa616

        SHA1

        5e50446061142e6fbe3ae3172aa5d96ecc568d19

        SHA256

        187199e06a0f50a01e23745c7002573c4f4fb6dacaec717317239865a1196ae9

        SHA512

        5d14fe4da5b480ca8b537ef7a36cc427419d1246b86e1e929011ecec5e4fccd6bd29fd7401a3f4f365edaf28b4f570639553e3b7a318187e0fe816710c9fb482

      • memory/1808-292-0x0000000006060000-0x0000000006070000-memory.dmp

        Filesize

        64KB

      • memory/1808-1102-0x0000000006E10000-0x0000000006E22000-memory.dmp

        Filesize

        72KB

      • memory/1808-1114-0x0000000008E50000-0x000000000937C000-memory.dmp

        Filesize

        5.2MB

      • memory/1808-1113-0x0000000008C70000-0x0000000008E32000-memory.dmp

        Filesize

        1.8MB

      • memory/1808-1112-0x0000000006060000-0x0000000006070000-memory.dmp

        Filesize

        64KB

      • memory/1808-1111-0x0000000007950000-0x00000000079A0000-memory.dmp

        Filesize

        320KB

      • memory/1808-1110-0x00000000078C0000-0x0000000007936000-memory.dmp

        Filesize

        472KB

      • memory/1808-1109-0x0000000006060000-0x0000000006070000-memory.dmp

        Filesize

        64KB

      • memory/1808-1108-0x0000000006060000-0x0000000006070000-memory.dmp

        Filesize

        64KB

      • memory/1808-1107-0x00000000071C0000-0x0000000007226000-memory.dmp

        Filesize

        408KB

      • memory/1808-1106-0x0000000007120000-0x00000000071B2000-memory.dmp

        Filesize

        584KB

      • memory/1808-1104-0x0000000006060000-0x0000000006070000-memory.dmp

        Filesize

        64KB

      • memory/1808-1103-0x0000000006E30000-0x0000000006E6C000-memory.dmp

        Filesize

        240KB

      • memory/1808-1101-0x0000000006CD0000-0x0000000006DDA000-memory.dmp

        Filesize

        1.0MB

      • memory/1808-1100-0x0000000006630000-0x0000000006C48000-memory.dmp

        Filesize

        6.1MB

      • memory/1808-295-0x0000000006060000-0x0000000006070000-memory.dmp

        Filesize

        64KB

      • memory/1808-291-0x0000000001B70000-0x0000000001BBB000-memory.dmp

        Filesize

        300KB

      • memory/1808-224-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/1808-222-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/1808-220-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/1808-218-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/1808-216-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/1808-214-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/1808-192-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/1808-191-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/1808-194-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/1808-196-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/1808-198-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/1808-200-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/1808-202-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/1808-204-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/1808-206-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/1808-208-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/1808-210-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/1808-212-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4176-176-0x0000000002A70000-0x0000000002A82000-memory.dmp

        Filesize

        72KB

      • memory/4176-162-0x0000000002A70000-0x0000000002A82000-memory.dmp

        Filesize

        72KB

      • memory/4176-151-0x0000000002A70000-0x0000000002A82000-memory.dmp

        Filesize

        72KB

      • memory/4176-185-0x0000000004F90000-0x0000000004FA0000-memory.dmp

        Filesize

        64KB

      • memory/4176-184-0x0000000004F90000-0x0000000004FA0000-memory.dmp

        Filesize

        64KB

      • memory/4176-182-0x0000000004F90000-0x0000000004FA0000-memory.dmp

        Filesize

        64KB

      • memory/4176-181-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/4176-180-0x0000000004F90000-0x0000000004FA0000-memory.dmp

        Filesize

        64KB

      • memory/4176-150-0x0000000004FA0000-0x0000000005544000-memory.dmp

        Filesize

        5.6MB

      • memory/4176-179-0x0000000004F90000-0x0000000004FA0000-memory.dmp

        Filesize

        64KB

      • memory/4176-178-0x0000000002A70000-0x0000000002A82000-memory.dmp

        Filesize

        72KB

      • memory/4176-154-0x0000000002A70000-0x0000000002A82000-memory.dmp

        Filesize

        72KB

      • memory/4176-186-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/4176-174-0x0000000002A70000-0x0000000002A82000-memory.dmp

        Filesize

        72KB

      • memory/4176-158-0x0000000002A70000-0x0000000002A82000-memory.dmp

        Filesize

        72KB

      • memory/4176-170-0x0000000002A70000-0x0000000002A82000-memory.dmp

        Filesize

        72KB

      • memory/4176-168-0x0000000002A70000-0x0000000002A82000-memory.dmp

        Filesize

        72KB

      • memory/4176-166-0x0000000002A70000-0x0000000002A82000-memory.dmp

        Filesize

        72KB

      • memory/4176-164-0x0000000002A70000-0x0000000002A82000-memory.dmp

        Filesize

        72KB

      • memory/4176-152-0x0000000002A70000-0x0000000002A82000-memory.dmp

        Filesize

        72KB

      • memory/4176-160-0x0000000002A70000-0x0000000002A82000-memory.dmp

        Filesize

        72KB

      • memory/4176-172-0x0000000002A70000-0x0000000002A82000-memory.dmp

        Filesize

        72KB

      • memory/4176-156-0x0000000002A70000-0x0000000002A82000-memory.dmp

        Filesize

        72KB

      • memory/4176-149-0x0000000004F90000-0x0000000004FA0000-memory.dmp

        Filesize

        64KB

      • memory/4176-148-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/4512-1120-0x0000000000780000-0x00000000007B2000-memory.dmp

        Filesize

        200KB

      • memory/4512-1121-0x00000000050C0000-0x00000000050D0000-memory.dmp

        Filesize

        64KB